Skip to main content
All CollectionsLegal
Security Assessment
Security Assessment

This article aims to shed light on how your data is safeguarded, providing you with a comprehensive understanding of security.

Updated over a year ago

Data Center Hosting: Our servers are hosted on Microsoft Azure Cloud and Amazon Web Services, with instances situated in data centers in Western Europe, specifically Amsterdam and Frankfurt.

Compliance: We are actively working towards SOC-2 compliance.

Disaster Recovery: We have put in place a comprehensive disaster recovery plan, that encompasses two data centers located in different geographic regions.

Physical Access Security: Our data centers are equipped with 24/7 security monitoring, and access is strictly limited to authorized personnel.

Internal Controls: To prevent unauthorized access, transmission, and storage of customer information, we implement an array of internal controls.

These include data encryption, access controls, audit trails, and an incident response plan.

Data Encryption: On Raklet, all data transmissions, including server-to-server communications, are subjected to encryption.

Multi-Tenant Environment: Our service operates within a multi-tenant environment, but rest assured, we have measures in place to shield your data from other customers.

These measures include data isolation, access controls, and audit trails.

Network Segmentation: We employ various network segmentation methods, such as VLANs, VPNs, and firewalls, to fortify data protection during transit.

Data Security: Our commitment to data security extends to both data in transit and data at rest, with responsibilities shared between our company and the cloud service/data center provider.

Did this answer your question?